Forgot your password?
typodupeerror

Comment: Re:Yeah, but women want it all (Score 1) 427

by PFactor (#46397465) Attached to: All Else Being Equal: Disputing Claims of a Gender Pay Gap In Tech
Not that I disagree with your point but clothing and makeup purchases can be amortized over several dates. A man might pay less overall than that specific woman, but he is probably paying more for the date he is actually on with her. She can wear the same outfit, use the same makeup, and have the same haircut for another date the next night and her cost per date just halved.

Comment: Re:Summary that misrepresents the Article... *shoc (Score 2) 373

by PFactor (#46267801) Attached to: Report: Valve Anti-Cheat (VAC) Scans Your DNS History
What he means is that there are rainbow tables available for many MD5 hashes. There is software that can search hundreds of thousands of possible hashes per second. You don't need to calculate the MD5 hash over, you just have to do a simple text compare, followed by a lookup in the rainbow table. If you have a rainbow table of the major hack sites in which you're interested, I bet it doesn't take more than a second or two to determine if the hash you sent is of one of those sites. Maybe that doesn't fit your definition of easily enumerable, but it fits mine.

Comment: Re:"Oh noes! The people keep voting it down!" (Score 2, Insightful) 153

by PFactor (#43434541) Attached to: Google, Apple Lead Massive List of Companies Supporting CISPA
That will only work for maybe 200 years. Example: the 2nd amendment's "shall not be infringed" bit that's been blatantly ignored for the last few decades. The founding fathers made that as clear as they could, yet we're still screwing it up. What makes you think we can make our intentions any clearer for any longer?

Comment: Highlights the importance of risk management (Score 1) 214

by PFactor (#40920581) Attached to: Could a Category 5 Hurricane Take Down East Coast Data Centers?
Here we have a risk that requires mitigation. If you owned the facilities in question you would know your disaster preparedness and would know how much effort you are willing and able to put into enhancing it.

But since you don't own these facilities you have to trust the companies that do own them to do what you would do (or better). The only real controls you have are in negotiating the initial contract (regarding SLAs, especially) and in designing your system to withstand a failure of one company to protect their facility. That means you have to either buy resources on both coasts from one company or buy resources from multiple companies whose facilities are geodispersed and make sure your code/platform understands and deals with losing one or more of them.

The leggy gal on the sales team won't tell you any of this. I think most people don't find out about it until the disaster actually happens. It's pretty much like any other piece of your tech stack: the vendors will whitewash the risks and your job is to see through that and manage it.

I submit this isn't a risk caused by the use of "the cloud" (egad, do I hate that term!) so much as a risk that's part of any IT project and you deal with it the same way.

So to answer the original question, maybe a CAT 5 hurricane can take those facilities down but the question you should be asking is, "Have we completely understood the risk to the business and have we taken appropriate steps to protect it?".

<<<<< EVACUATION ROUTE <<<<<

Working...